This project contains files for cyber security
☆36Dec 17, 2018Updated 7 years ago
Alternatives and similar repositories for ml_cyber_security_usecases
Users that are interested in ml_cyber_security_usecases are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Projects that show my knowledge and experience of Cyber Security.☆15Jan 27, 2022Updated 4 years ago
- Models and code for the paper: In Nomine Function: Naming Functions in Stripped Binaries with Neural Networks☆18Jan 29, 2021Updated 5 years ago
- Awesome list for asm2vec☆17Feb 1, 2021Updated 5 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Code for USENIX'18 paper: "Effective Detection of Multimedia Protocol Tunneling using Machine Learning"☆11Nov 19, 2021Updated 4 years ago
- InSpec profile to validate the secure configuration of Red Hat Enterprise Linux 7, against DISA's Red Hat Enterprise Linux 7 Security Tec…☆15Dec 15, 2025Updated 3 months ago
- 🎣 Using deep learning (word level and character level embeddings combined with GRU layers) to detect Phishing using the URL☆19Jul 30, 2020Updated 5 years ago
- A way to control devices via Bluetooth w/ an ESP32☆14Jul 6, 2024Updated last year
- ☆12Apr 20, 2025Updated 11 months ago
- A blanked execution framework based on the Unicorn engine☆19Jan 29, 2017Updated 9 years ago
- Experimental ONLY: This consolidated data of scenario-2 of the US-CERT dataset for insider threats to be used with TF 2.0 and Keras☆20Apr 28, 2022Updated 3 years ago
- An Interpretable Self-Attention Network with block-attention and attention-attribution.☆12Sep 22, 2023Updated 2 years ago
- Extracting the ACFG feature of each function from the binary file based on angr☆20Mar 21, 2019Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- experiment☆11Jan 29, 2021Updated 5 years ago
- This is the official repository for the ICLR 2023 paper Causal Balancing for Domain Generalization☆13May 17, 2023Updated 2 years ago
- Machine learning model for detecting DDoS attacks, CIC-DDoS2019 dataset☆23Nov 25, 2024Updated last year
- Machine Learning for Network Intrusion Detection & Misc Cyber Security Utilities☆223Apr 25, 2024Updated last year
- Unofficial pytorch implementation of paper:stacked capsule autoencoders.☆11Jul 25, 2024Updated last year
- Code for the paper "Deep Partition Aggregation: Provable Defenses against General Poisoning Attacks"☆13Aug 22, 2022Updated 3 years ago
- A set of Python tools useful for cryptography and cryptanalysis.☆14Feb 3, 2017Updated 9 years ago
- ☆10Apr 7, 2021Updated 4 years ago
- This project showcases how to exploit vulnerabilities in NFC cards using Arduino and RFID technology. By leveraging the MFRC522 RFID modu…☆16Jul 4, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Convert all valid keys from flipperzero-goodies to rfid/ibutton fuzzer format☆17Jul 30, 2023Updated 2 years ago
- Tutorial on TikZ☆14Nov 15, 2024Updated last year
- This is my study on detection and mitigation DDoS attacks in SDN☆21Jan 16, 2024Updated 2 years ago
- ☆13Jul 13, 2024Updated last year
- ☆56Oct 22, 2020Updated 5 years ago
- Source code and models of ACM MobiHoc 2019 paper "Scaling Deep Learning Models for Spectrum Anomaly Detection"☆12Jul 9, 2019Updated 6 years ago
- statistical similarity of binaries (Esh)☆74Jul 1, 2016Updated 9 years ago
- Improving Adversarial Robustness via Mutual Information Estimation☆11Apr 2, 2024Updated last year
- An archive of BASHLITE source code☆13Oct 29, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An open source tool chain to simulate cyber attacks in the power system☆12May 4, 2017Updated 8 years ago
- TriFlow: Triaging Android Applications using Speculative Information Flows☆13Dec 26, 2022Updated 3 years ago
- My graduation project☆10Feb 16, 2022Updated 4 years ago
- Code used in Tiukhova et al. (2022). Influencer Detection with Dynamic Graph Neural Networks. TGL@Neurips 2022.☆11Feb 9, 2023Updated 3 years ago
- DEPRECATED: System modelling and fault-injection-based resilience assessment in Python☆10Mar 17, 2022Updated 4 years ago
- ☆17Aug 17, 2024Updated last year
- A multi-community spatio-temporal graph convolutional network (MC_STGCN) for passenger demand forecasting at multi-region level☆10Sep 28, 2020Updated 5 years ago